- Table View
- List View
Hatching Twitter: A True Story of Money, Power, Friendship and Betrayal
by Nick Bilton'A tale of Machiavellian plots and coups d'etat, it's just all so gripping' Chris Evans, BBC Radio 2THE ULTIMATE 21ST CENTURY BUSINESS STORYSince 2006, Twitter has grown from the accidental side project of a failing internet start-up, to a global icon that by 2013 had become an $11.5bn business. But the full story of Twitter's hatching has never been told before.In his revelatory new book, New York Times journalist Nick Bilton takes readers behind the scenes of Twitter as it grew at exponential speeds, and inside the heads of the four hackers who created it: ambitious millionaire Evan Williams; tattooed mastermind Jack Dorsey; joker and diplomat Biz Stone; and Noah Glass, the shy but energetic geek who invested his whole life in Twitter, only to be kicked out and expunged from the company's official history.Combining unprecedented access with exhaustive investigative reporting, and drawing on hundreds of sources, documents and internal emails, New York Times' bestseller HATCHING TWITTER is a blistering drama of betrayed friendships and high-stakes power struggles. A business story like no other, it will shock, expose and inspire.
Hatching Twitter: A True Story of Money, Power, Friendship and Betrayal
by Nick BiltonTHE ULTIMATE 21ST CENTURY BUSINESS STORYEv told Jack he had to 'chill out' with the deluge of media he was doing. 'It's bad for the company,' Ev said. 'It's sending the wrong message.' Biz sat between them, watching like a spectator at a tennis match.'But I invented Twitter,' Jack said.'No, you didn't invent Twitter,' Ev replied. 'I didn't invent Twitter either. Neither did Biz. People don't invent things on the Internet. They simply expand on an idea that already exsists.'Since 2006, Twitter has grown from the accidental side project of a failing internet start-up, to a global icon that by 2013 had become an $11.5bn business. But the full story of Twitter's hatching has never been told before.In his revelatory new book, New York Times journalist Nick Bilton takes readers behind the scenes of Twitter as it grew at exponential speeds, and inside the heads of the four hackers who created it: ambitious millionaire Evan Williams; tattooed mastermind Jack Dorsey; joker and diplomat Biz Stone; and Noah Glass, the shy but energetic geek who invested his whole life in Twitter, only to be kicked out and expunged from the company's official history.Combining unprecedented access with exhaustive investigative reporting, and drawing on hundreds of sources, documents and internal e-mails, HATCHING TWITTER is a blistering drama of betrayed friendships and high-stakes power struggles. A business story like no other, it will shock, expose and inspire.(P)2013 Penguin Group USA
Hate Cell: A Casey Templeton Mystery
by Gwen MolnarThirteen-year-old Casey Templeton has recently moved with his family to the southeastern Alberta town of Richford. One night Casey seeks refuge from a snowstorm in an abandoned farmhouse and stumbles upon his nearly frozen, unconscious science teacher, Mr. Deverell. Casey attempts to revive his teacher and searches the house for something to make a fire with. In the attic he makes a frightening discovery – a sophisticated office filled with computers, a printer, and racist posters and flyers! Richford is harbouring a vicious cell of white racists who are targeting everyone they deem "alien." Somehow Mr. Deverell is connected to the dangerous organization, and so, too, are other residents, young and old, in Casey’s new town. Soon the RCMP and Casey’s hacker brother, Hank, get involved in the mystery, but it’s Casey who leads the investigation into a warped world where hate is marketed on the Internet and innocent people are preyed on by bigots and bullies blinkered by their own prejudices.
Hate Crimes in Cyberspace
by Danielle Keats CitronMost Internet users are familiar with trollingâe"aggressive, foul-mouthed posts designed to elicit angry responses in a siteâe(tm)s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims. Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attackerâe(tm)s âeoerevenge pornâe#157; were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs. Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.
Hate Speech and Polarization in Participatory Society (Routledge Studies in Media, Communication, and Politics)
by Marta Pérez-Escolar José Manuel Noguera-VivoThis timely volume offers a comprehensive and rigorous overview of the role of communication in the construction of hate speech and polarization in the online and offline arena. Delving into the meanings, implications, contexts and effects of extreme speech and gated communities in the media landscape, the chapters analyse misleading metaphors and rhetoric via focused case studies to understand how we can overcome the risks and threats stemming from the past decade’s defining communicative phenomena. The book brings together an international team of experts, enabling a broad, multidisciplinary approach that examines hate speech, dislike, polarization and enclave deliberation as cross axes that influence offline and digital conversations. The diverse case studies herein offer insights into international news media, television drama and social media in a range of contexts, suggesting an academic frame of reference for examining this emerging phenomenon within the field of communication studies. Offering thoughtful and much-needed analysis, this collection will be of great interest to scholars and students working in communication studies, media studies, journalism, sociology, political science, political communication and cultural industries.
Hate Speech and Political Violence: Far-Right Rhetoric from the Tea Party to the Insurrection
by Brigitte L. Nacos Robert Shapiro Yaeli Bloch-ElkonHow did the United States descend into crisis, with institutions frayed, political violence mounting, and democracy itself in peril? This timely book identifies how the Tea Party and its extremist narratives laid the groundwork for the rise of Donald Trump, his MAGA movement, and the January 6, 2021, assault on the Capitol.Brigitte L. Nacos, Yaeli Bloch-Elkon, and Robert Y. Shapiro trace the escalation of a strain of extremist rhetoric in right-wing political discourse after the inauguration of Barack Obama. Drawing on extensive and in-depth analysis of political communication in both traditional media and online spaces, they demonstrate how the dominant rhetorical styles of the Trump era were pioneered by the Tea Party. A backlash to the election of the first Black president, this reactionary social movement deployed violent language and spread anti-Obama paranoia, with the assistance of media insiders, GOP leaders, and conservative advocacy groups. Donald Trump rose to political prominence by hitching himself to the “birther” racist conspiracy theory, espoused by many Tea Partiers, and drew from their aggressive and hyperpartisan repertoire. Ultimately, this book shows, the increasingly violent rhetoric of right-wing extremists spilled over into real-world political violence. Revealing the path the Tea Party blazed to Trump and the insurrectionists, Hate Speech and Political Violence provides timely new insights into the threats facing American democracy.
The Hawke Method: The Three Principles of Marketing that Made Over 3,000 Brands Soar
by Erik Huberman Hawke Media TeamThe USA Today bestseller. &“Whether you&’re an executive at a Fortune 500 company or a first-time entrepreneur, you&’ve found a battle-tested mentor.&” —Keith Ferrazzi, New York Times-bestselling author of Never Eat Alone Ever wonder how the biggest brands in the world make it to the top? Here&’s a hint: it&’s more than just a well-placed billboard or a TV ad. According to Erik Huberman, the Founder and CEO of Hawke Media, there&’s a common framework behind every successful marketing strategy. After helping over 3,000 brands find success through his holistic approach, Erik has distilled the art of marketing into three core elements: awareness, nurturing, and trust. Without all three, the system fails. From fledgling students to seasoned industry veterans, anyone can gain from the shrewd strategies in The Hawke Method. And use them to fly above the competition. &“[Huberman&’s] knowledge and positive energy are a recipe for success in the world of e-commerce.&” —Bennett Sherman, Digital Ventures &“Simply put, Erik is a marketing and business god. He knows how to make a product or idea go big and has proven it with his team.&” —Ben Parr, author of Captivology &“Erik is a true visionary. The world would be a far better place if more business leaders started moving to his beat.&” —Andre Benjamin, aka Andre 3000 of Outkast &“Erik is the living embodiment of entrepreneurship. He seeks out opportunity while simultaneously empowering those around him.&” —Robyn Ward, head of New Media Ventures at United Talent Agency &“Huberman is a dynamic, uber-talented entrepreneur . . . illuminating the path to innovation, radical service, and win-win relationships.&” —Christopher Kai, bestselling author of Big Game Hunting
haXe 2 Beginner's Guide
by Benjamin DasnoisThis book is part of the Packt Beginner's Guide series. Written in an engaging style, it offers step-by-step examples with screenshots at key steps and clear explanation of what is happening in each task.This book is written for both Beginners and Developers who want to learn this multi-platform programming language to build web applications from scratch.
Haxe Game Development Essentials
by Jeremy MccurdyCreate games on multiple platforms from a single codebase using Haxe and the HaxeFlixel engine About This Book * Learn the modern, cross-platform language Haxe to build games without any trouble * Create engaging 2D games that are compatible with desktop, web, and mobile platforms * Learn how to speed up your workflow with OpenFL and HaxeFlixel using this useful and compact guide Who This Book Is For This book is for game developers with some experience programming games on one or more platforms already. If you want to leverage your game development experience on one platform to develop for multiple platforms and to get up and running quickly, this book is for you. Having prior experience with a language similar to Haxe, such as ActionScript or JavaScript will help, but isn't required. What You Will Learn * Understand the fundamentals of the Haxe programming language * Set up a development environment that will work on Windows, Mac, and Linux * Create fun 2D games using OpenFL and HaxeFlixel * Understand how to implement a user interface * Enhance the gameplay experience with cool animations * Improve immersion by adding sound * Make your game modular and easily expandable using configuration files * Compile games that will work on desktop, web, and mobile platforms In Detail Haxe is a powerful and high-level multi-platform language that's incredibly easy to learn. Used by thousands of developers and many high-profile companies, Haxe is quickly emerging as a forerunner in the area of cross-platform programming. OpenFL builds on top of Haxe to make developing for multiple platforms quick and painless. HaxeFlixel provides you with the tools you need to build amazing 2D games easier than ever before. Cross-platform development has been supercharged using the Haxe programming language, making it increasingly easy and hassle-free to develop multi-platform games. If you've programmed games before and want to learn out how to deliver games across multiple platforms, or develop games faster, then Haxe Game Development Essentials is the book for you. It starts by showing you how to set up your development environment, then running you through some Haxe language fundamentals, and finally taking you through the process of programming a game from start to finish. You will learn how to create a side scrolling shooter game using HaxeFlixel. Next you will learn to enhance the game with new gameplay features, user interfaces, animations, sound, and configuration files to make your game expandable. Once your game is built and ready, you will learn how to deploy it to web, Android, iOS, and desktop systems. By the end of this book, you will be confident about creating multi-platform games using Haxe, OpenFL, and HaxeFlixel in a faster and easier way. Style and approach Since this book is aimed at people who have worked on games before, this book is written in a way that will get you quickly up to speed with a new set of tools, but will still be accessible for less experienced developers. Each chapter covers an essential milestone in building a game from start to finish. The chapters move in a logical fashion, starting with the basics of Haxe development and ending with preparing a game for deployment.
Hazard Modeling and Assessment of the Nile Delta Coast: Remote Sensing and GIS Applications
by Kamal Srogy DarwishThe book presents the results of a doctoral thesis conducted under the supervision of two international governmental universities in Egypt and the USA. This book is very important for specialists in the field of Physical Geography with concentration of Geographic Information Science and Remote Sensing techniques for Coastal Hazard Assessment. It deals with coastal hazards and disasters using unique techniques and methods, such as Coastline Change Detection, Sea-Level Rise Modeling and Future Predication, Coastal Erosion Hazard Mapping, and Coastal Vulnerability Index. The integration of geospatial technologies that applied accurately in this book especially for the coastal hazard mitigation and protection devise evaluation makes it very helpful for researchers and academics, as well as for coastal and civil engineers.
¡Hazla en grande!
by Gary VaynerchukUna guía de vanguardia para construir tu propio camino hacia el éxito profesional y financiero. Aprende a construir tu negocio y a influir en los demás como lo hacen los grandes empresarios. Gary Vaynerchuk detalla por qué es fundamental crear una marca personal vibrante para el éxito empresarial, ofreciendo una perspectiva única sobre lo que ha cambiado con las redes sociales y qué principios son eternos. A través de historias de éxito de otros empresarios y su propia historia, explica por qué el éxito tiene mucho que ver con la comprensión de las plataformas de redes sociales y la voluntad de hacer todo lo posible para que estas herramientas funcionen a su máximo potencial. En este libro práctico, Gary analiza cada una de las principales plataformas de redes sociales para que cualquiera sepa exactamente cómo amplificar su marca personal en cada una. Ofrece consejos teóricos y tácticos sobre cómo convertirse en el más relevante en plataformas, desde las más conocidas como YouTube e Instagram, hasta las emergentes como Musical.ly. Para aquellos con más experiencia, ¡Hazla en grande! ilumina algunos matices poco conocidos y proporciona consejos innovadores y ajustes inteligentes probados para mejorar las estrategias probadas más comunes.
HBase: Random Access to Your Planet-Size Data (Definitive Guide Ser.)
by Lars GeorgeIf you're looking for a scalable storage solution to accommodate a virtually endless amount of data, this book shows you how Apache HBase can fulfill your needs. As the open source implementation of Google's BigTable architecture, HBase scales to billions of rows and millions of columns, while ensuring that write and read performance remain constant. Many IT executives are asking pointed questions about HBase. This book provides meaningful answers, whether you’re evaluating this non-relational database or planning to put it into practice right away.Discover how tight integration with Hadoop makes scalability with HBase easierDistribute large datasets across an inexpensive cluster of commodity serversAccess HBase with native Java clients, or with gateway servers providing REST, Avro, or Thrift APIsGet details on HBase’s architecture, including the storage format, write-ahead log, background processes, and moreIntegrate HBase with Hadoop's MapReduce framework for massively parallelized data processing jobsLearn how to tune clusters, design schemas, copy tables, import bulk data, decommission nodes, and many other tasks
HBase Administration Cookbook
by Yifeng JiangAs part of Packt's cookbook series, each recipe offers a practical, step-by-step solution to common problems found in HBase administration. This book is for HBase administrators, developers, and will even help Hadoop administrators. You are not required to have HBase experience, but are expected to have a basic understanding of Hadoop and MapReduce.
HBase Design Patterns
by Sujee Maniyam Mark KerznerIf you are an intermediate NoSQL developer or have a few big data projects under your belt, you will learn how to increase your chances of a successful and useful NoSQL application by mastering the design patterns described in the book. The HBase design patterns apply equally well to Cassandra, MongoDB, and so on.
HBase Essentials
by Nishant GargWith an example-oriented approach, this book begins by providing you with a step-by-step learning process to effortlessly set up HBase clusters and design schemas. Gradually, you will be taken through advanced data modeling concepts and the intricacies of the HBase architecture. Moreover, you will also get acquainted with the HBase client API and HBase shell. Essentially, this book aims to provide you with a solid grounding in the NoSQL columnar database space and also helps you take advantage of the real power of HBase using data scans, filters, and the MapReduce framework. Most importantly, the book also provides you with practical use cases covering various HBase clients, HBase cluster administration, and performance tuning.
HBase High Performance Cookbook
by Ruchir ChoudhryOver 80 recipes to effectively maximize your system performance with HBaseAbout This BookArchitect a good HBase cluster for a very large distributed systemGet to grips with the concepts of performance tuning with HBaseA pragmatic guide full of engaging recipes and attractive screenshots to enhance your system's performanceWho This Book Is ForThis book is intended for developers and architects who want to know all about HBase at a hands-on level. This book is also for big data enthusiasts and database developers who have worked with other NoSQL databases and now want to explore HBase as another futuristic scalable database solution in the big data space.What You Will LearnConfigure HBase from a high performance perspectiveGrab data from various RDBMS/Flat files into the HBASE systemsUnderstand table design and perform CRUD operationsFind out how the communication between the client and server happens in HBaseGrasp when to use and avoid MapReduce and how to perform various tasks with itGet to know the concepts of scaling with HBase through practical examplesSet up Hbase in the Cloud for a small scale environmentIntegrate HBase with other tools including ElasticSearchIn DetailApache HBase is a non-relational NoSQL database management system that runs on top of HDFS. It is an open source, disturbed, versioned, column-oriented store and is written in Java to provide random real-time access to big Data.We'll start off by ensuring you have a solid understanding the basics of HBase, followed by giving you a thorough explanation of architecting a HBase cluster as per our project specifications. Next, we will explore the scalable structure of tables and we will be able to communicate with the HBase client. After this, we'll show you the intricacies of MapReduce and the art of performance tuning with HBase. Following this, we'll explain the concepts pertaining to scaling with HBase. Finally, you will get an understanding of how to integrate HBase with other tools such as ElasticSearch. By the end of this book, you will have learned enough to exploit HBase for boost system performance.
HBase in Action
by Amandeep Khurana Nick DimidukSummaryHBase in Action has all the knowledge you need to design, build, and run applications using HBase. First, it introduces you to the fundamentals of distributed systems and large scale data handling. Then, you'll explore real-world applications and code samples with just enough theory to understand the practical techniques. You'll see how to build applications with HBase and take advantage of the MapReduce processing framework. And along the way you'll learn patterns and best practices.About the TechnologyHBase is a NoSQL storage system designed for fast, random access to large volumes of data. It runs on commodity hardware and scales smoothly from modest datasets to billions of rows and millions of columns.About this BookHBase in Action is an experience-driven guide that shows you how to design, build, and run applications using HBase. First, it introduces you to the fundamentals of handling big data. Then, you'll explore HBase with the help of real applications and code samples and with just enough theory to back up the practical techniques. You'll take advantage of the MapReduce processing framework and benefit from seeing HBase best practices in action. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideWhen and how to use HBasePractical examplesDesign patterns for scalable data systemsDeployment, integration, and designWritten for developers and architects familiar with data storage and processing. No prior knowledge of HBase, Hadoop, or MapReduce is required.Table of ContentsPART 1 HBASE FUNDAMENTALSIntroducing HBaseGetting startedDistributed HBase, HDFS, and MapReducePART 2 ADVANCED CONCEPTSHBase table designExtending HBase with coprocessorsAlternative HBase clientsPART 3 EXAMPLE APPLICATIONSHBase by example: OpenTSDBScaling GIS on HBasePART 4 OPERATIONALIZING HBASEDeploying HBaseOperations
HCI and Design in the Context of Dementia (Human–Computer Interaction Series)
by Rens Brankaert Gail KenningOld age is currently the greatest risk factor for developing dementia. Since older people make up a larger portion of the population than ever before, the resulting increase in the incidence of dementia presents a major challenge for society. Dementia is complex and multifaceted and impacts not only the person with the diagnosis but also those caring for them and society as a whole. Human-Computer Interaction (HCI) design and development are pivotal in enabling people with dementia to live well and be supported in the communities around them. HCI is increasingly addressing the need for inclusivity and accessibility in the design and development of new technologies, interfaces, systems, services, and tools. Using interdisciplinary approaches HCI engages with the complexities and ‘messiness’ of real-world design spaces to provide novel perspectives and new ways of addressing the challenge of dementia and multi-stakeholder needs. HCI and Design in the Context of Dementia brings together the work of international experts, designers and researchers working across disciplines. It provides methodologies, methods and frameworks, approaches to participatory engagement and case studies showing how technology can impact the lives of people living with dementia and those around them. It includes examples of how to conduct dementia research and design in-context in the field of HCI, ethically and effectively and how these issues transcend the design space of dementia to inform HCI design and technology development more broadly. The book is valuable for and aimed at designers, researchers, scholars and caregivers that work with vulnerable groups like people with dementia, and those directly impacted.
HCI and User-Experience Design
by Aaron MarcusThis book consists of a series of essays which addresses the essentials of the development processes in user-experience design (UX design) planning, research, analysis, evaluation, training and implementation, and deals with the essential components (metaphors, mental models, navigation, and appearance) of user-interfaces and user-experiences during the period of 2002-2007. These essays grew from the authors own column entitled 'Fast Forward' which appeared in Interaction Magazine - the flagship publication of the ACM Special Interest Group on Human-Computing Interaction (SIGCHI). Written in such a way as to ensure longevity, these essays have not been edited or updated, however a short Postscripts has been added to provide some comments on each topic from a current perspective. HCI and User-Experience Design provides a fascinating historical review of the professional and research world of UX and HCI during a period of significant growth and development and would be of interest to students, researchers, and designers who are interested in recent developments within the field.
HCI for Cybersecurity, Privacy and Trust: First International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Orlando, FL, USA, July 26–31, 2019, Proceedings (Lecture Notes in Computer Science #11594)
by Abbas MoallemThis book constitutes the thoroughly refereed proceedings of the First International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. HCI-CPT 2019 includes a total of 32 papers; they were organized in topical sections named: Authentication; cybersecurity awareness and behavior; security and usability; and privacy and trust.
HCI for Cybersecurity, Privacy and Trust: Second International Conference, HCI-CPT 2020, Held as Part of the 22nd HCI International Conference, HCII 2020, Copenhagen, Denmark, July 19–24, 2020, Proceedings (Lecture Notes in Computer Science #12210)
by Abbas MoallemThis book constitutes the proceedings of the Second International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2020, held as part of the 22nd International Conference, HCI International 2020, which took place in Copenhagen, Denmark, in July 2020. The total of 1439 papers and 238 posters included in the 37 HCII 2020 proceedings volumes was carefully reviewed and selected from 6326 submissions. HCI-CPT 2020 includes a total of 45 regular papers; they were organized in topical sections named: human factors in cybersecurity; privacy and trust; usable security approaches. As a result of the Danish Government's announcement, dated April21, 2020, to ban all large events (above 500 participants) until September 1, 2020, the HCII 2020 conference was held virtually.
HCI for Cybersecurity, Privacy and Trust: Third International Conference, HCI-CPT 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24–29, 2021, Proceedings (Lecture Notes in Computer Science #12788)
by Abbas MoallemThis book constitutes the proceedings of the Third International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2021, held as part of the 23rd International Conference, HCI International 2021, which took place virtually in July 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. HCI-CPT 2021 includes a total of 30 regular papers; they were organized in topical sections named: usable security; security and privacy by design; user behavior analysis in cybersecurity; and security and privacy awareness.
HCI for Cybersecurity, Privacy and Trust: 4th International Conference, HCI-CPT 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 – July 1, 2022, Proceedings (Lecture Notes in Computer Science #13333)
by Abbas MoallemThis book constitutes the refereed proceedings of the 4th International Conference on HCI for Cybersecurity, Privacy and Trust, HCI-CPT 2022, held as part of the 23rd International Conference, HCI International 2022, which was held virtually in June/July 2022. The total of 1271 papers and 275 posters included in the HCII 2022 proceedings was carefully reviewed and selected from 5487 submissions. The HCI-CPT 2022 proceedings focuses on to user privacy and data protection, trustworthiness and User Experience in cybersecurity, multi-faceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments, as well as the impact of the Covid-19 pandemic on cybersecurity
HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Copenhagen, Denmark, July 23–28, 2023, Proceedings (Lecture Notes in Computer Science #14045)
by Abbas MoallemThis proceedings, HCI-CPT 2023, constitutes the refereed proceedings of the 5th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 24th International Conference, HCI International 2023, which took place in July 2023 in Copenhagen, Denmark. The total of 1578 papers and 396 posters included in the HCII 2023 proceedings volumes was carefully reviewed and selected from 7472 submissions. The HCI-CPT 2023 proceedings focuses on to user privacy and data protection, trustworthiness and user experience in cybersecurity, multifaceted authentication methods and tools, HCI in cyber defense and protection, studies on usable security in Intelligent Environments. The conference focused on HCI principles, methods and tools in order to address the numerous and complex threats which put at risk computer-mediated human-activities in today’s society, which is progressively becoming more intertwined with and dependent on interactive technologies.
HCI for Cybersecurity, Privacy and Trust: 6th International Conference, HCI-CPT 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14729)
by Abbas MoallemThis proceedings, HCI-CPT 2024, constitutes the refereed proceedings of the 6th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 26th International Conference, HCI International 2024, which took place from June 29 - July 4, 2024 in Washington DC, USA. Two volumes of the HCII 2024 proceedings are dedicated to this year’s edition of the HCI-CPT Conference. The first focuses on topics related to Cyber Hygiene, User Behavior and Security Awareness, and User Privacy and Security Acceptance. The second focuses on topics related to Cybersecurity Education and Training, and Threat Assessment and Protection.